bk AHC: Other commercial uses. (19.4)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

In a company which has many workers there are often message boards to the workers in different departments, which all of the workers read when arriving to work. There’s no end to human curiosity thus some people read the messages not meant to them. Not every company has the means and even economic benefit for setting up electronic devices of communication, because these need maintenance, repair and so on. Thus the message board will still be there for many years to come in many large companies. To specify some messages on the board for reading by the people in certain department only, a simplest encrypted message can be put up on the board, while all of the workers in the department have the key. If someone has a difficulty to read the message on the board then another one in the same department can help out. Shaking up the capacity of the brain to function properly will only be beneficial for a company in a life of a routine. Encrypted messages in a company don’t need to be in a completely secret writing. A steganographic way may also be used. In the end of the book on the pages to print/copy (chapter 28) I give an example of writing cryptic messages on top of a regular text. The example of different inserted codes are on the first five lines of the sample text — you can practice with the following lines on a printed/copied page and then copy it after your cryptic symbols are written, then you will see how much of the added signs will be lost and how many remain visible after several copies. Almost any field of human non-digital communication which needs some parts of the information exchange to remain confidential or secured may find the cryptographic writing method useful in some ways, while using a light encryption in basic level or strong encryption in medium level. The strong encryption in high level is mostly for personal use only, for having a code which one can use the entire lifetime without worries.

Advertisements

bk AHC: Cryptic orders. (19.3)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

The use of cryptic orders can be accomplished in a similar way to the cryptic signatures, with the most basic advanced encryption method. It may be utile within companies and also between different companies which are in a regular partnership. Instead of cryptic signature the encrypted parts will be some items, or demands, or whatever needed, which are written on a document using the hieroglyphic method, while only the dedicated parties can read the messages. Then the document can pass through all the other departments and delivery persons without disclosing the sensitive parts of the document.